|Publication number||US7516487 B1|
|Application number||US 10/850,505|
|Publication date||Apr 7, 2009|
|Filing date||May 20, 2004|
|Priority date||May 21, 2003|
|Also published as||US8533823, US20090260083|
|Publication number||10850505, 850505, US 7516487 B1, US 7516487B1, US-B1-7516487, US7516487 B1, US7516487B1|
|Inventors||Ronald W. Szeto, Nitin Jain, Ravindran Suresh, Philip Kwan|
|Original Assignee||Foundry Networks, Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (65), Non-Patent Citations (33), Referenced by (35), Classifications (12), Legal Events (7)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present application is a continuation in part of U.S. patent application Ser. No. 10/631,366 filed Jul. 31, 2003, which claims benefit from U.S. Provisional Patent Application Ser. No. 60/472,158, filed May 21, 2003, which is incorporated herein by reference, and also claims benefit from U.S. Provisional Patent Application Ser. No. 60/472,170, filed May 21, 2003, which is incorporated herein by reference.
The present invention relates to a method of providing for enhanced security on a computer network to reduce the risk created by the spoofing of IP addresses.
As is widely known source IP Address spoofing is a common technique used in denial of service attacks (DoS). Other types of source IP address spoofing attacks are widely known, and include attacks such as distributed denial of service attacks (DDoS), Worm attacks, and Man In the Middle attacks. Spoofed Source IP Address attacks can also include Smurf attacks, NameServer attacks, and ICMP, IGMP, and UDP protocol attacks. One goal in some spoofing attacks is to spread a software virus to as many random new victims as possible, and other attacks are designed to overwhelm a computer system, and other attacks are used to steal information.
The computer network 100 can have a number of subnets. As shown in
Source IP spoofing occurs when an attacker host uses a source IP address, which does not correspond, or is not assigned, to its MAC address, in a transmitted data packet. For example, the attacker host may select a source IP address for a different host on a different subnet and transmit a data packet with this false, or spoofed, IP address. This data packet would then be received by the destination device, and the destination device would read the spoofed IP address and it would appear to the destination device that the data packet had come from the device which is actually assigned the source IP address which was used by the attacker host.
In terms of network security defenses, traditional blocks to this type for source IP spoofing were to create inbound filters on the router ports 140-146 that supported the subnets 102-108. The router filter operates such that it knows which IP addresses should be received from a specific subnet connected to the particular port. This allows ISP's and enterprises to block randomly spoofed source IP addresses, where the spoofed IP address received on a particular port of the router, is not consistent with source IP addresses for the subnet which is coupled to the particular port of the router. Hackers have recognized the limitations inherent in this type of source IP address anti-spoofing process, and developed spoofing software tools, some of which are referred to as “zombies, and “bots” which now spoof source IP addresses from within their own subnet and subnet mask settings. For customers with large class B subnets, the router level (layer 3) type of defense is not very effective as hundreds and potentially thousands of hosts on the subnet can still be affected.
An Automatic Spoof detector (referred to as “Spoofwatch”) has been developed in an attempt to efficiently detect hosts performing source IP spoofing. Spoofwatch works on the premise that these hosts do not respond to ARP requests for their spoofed IP addresses. This solution has many potential shortcomings. For example, the router 136 can receive very large numbers of different source IP addresses in different data packets. Thus, a very large amount of router's processing power is consumed with generating the ARP requests and monitoring the responses.
A review of a number of different websites related to networking showed a number of different approaches related to preventing IP address spoofing, but each approach was very different than that discussed herein. Other techniques have been developed for providing defenses against source IP address spoofing. One of these other approaches relies on using encryption, and source IP filtering at the layer 3 level, which is after the data packets have been transmitted from the subnet to the router.
Additional information regarding different approaches to combating source IP spoofing can be found at http://www.cisco.com/en/US/tech/tk86/tk803/technologies_tech_note09186a00800a7828.shtml. Additional websites provide discussion regarding the risks associated with source IP address spoofing and provide some discussion for ways to combat spoofing, see for example: http://www.sans.org/rr/threats/spoofed.php; http://www.cert.org/incident_notes/IN-2000-04.html; http://www.anml.iu.edu/PDF/Automatic_Spoof_Detector.pdf, and http://www.linuxgazette.com/issue63/sharma.html.
In order to increase the efficiency and effectiveness of combating source IP spoofing it would be beneficial to provide source IP spoofing at lower level in the network hierarchy, in a manner which has not previously been provided.
One approach to improving defenses against Source IP Spoofing is to attack the problem at the subnet or Layer 2 level. Because ISP's and Universities have been hard hit with spoofing attacks, a feature that stops Source IP Spoofing at the Layer 2 subnet level provides a number of advantages. ISPs and Universities frequently have very large subnets, and as a result, utilizing defenses against spoofing at the router lever can consume an inordinate amount of the router's processing power. In the past networking devices, such as switches, at the subnet level did not analyze source IP addresses in data packets sent by hosts on the subnet, and in particular it is believed that networking devices at the layer 2 level did not analyze source IP address information in data packets to provide anti-spoofing security procedures based on an analysis of source IP address information in data packets transmitted by hosts on the subnet. Some layer 2 switching devices did provide for some security on ports of the switch, where the source host MAC address was used on an inbound filter on the port to which the host was connected. However, this MAC address type of port security did not provide effective protection against a host attacker that was spoofing source IP addresses.
The basic switching operation of such a network device is well known. The network device 200 contains a processing device which operates to analyze data packets received on a port to identify the MAC address of the host sending the data packet. Each data packet can include at least the MAC address of the device sending the data packet (source MAC address) and the MAC address of the device to which the data packet is to be sent to (destination MAC address). As discussed above each host on the subnet can also have an IP address. In the past where one host device on a subnet is sending data packets to other host devices on the same subnet, a switching device would refer to a MAC address look up table to determine which port the destination host was on, and the data packet would be transmitted through the port which is connected with the destination host. A typical layer 2 switch would not analyze the source IP address in connection with this switching function, and would not use the source IP address to provide source IP anti-spoofing operations.
In the network device 200, however, additional functions are provided which allow for utilizing source IP address information. As described herein much of this additional functionality is described in connection with a port security processor 242. Functions of the port security processor can be implemented in a single processor, which is programmed to provide a number of different functions, or aspects of the functions of the port security could be implemented by different processors which work cooperatively to provide the functions herein. As shown in the embodiment of
The table which stores the IP address/MAC address pairs can be implemented using a number of different devices. In the embodiment shown in
Some prior switches allowed for initially learning source IP addresses for MAC addresses, however, these prior switches were not used for protecting against source IP address spoofing. One limitation of utilizing a prior switch was that these were not designed to allow for the fact that source IP addresses are generally not static, so the source IP address for a MAC address can change over time.
In the network device 200, the source IP address detector 236 automatically learns the source IP address for each MAC address entering a port of the network device 200. The port security processor 242 of the network device 200 also provides for dynamically adjusting inbound source IP address anti-spoofing blocking criteria for each port, and a system administrator can specify how many devices or IP addresses to permit per port of the network device 200. For example, the port security processor 242, can be programmed to receive input from a system administrator's computer 246, which can be coupled to the network device 200 by a secure port 248, and to provide information to the system administrator's computer 246. Using the ability to input commands to the network device 200 a system administrator can control aspects of the port security operation, as well as other aspects of the operation of the network device 200. For example, the system administrator could control the maximum number of source IP addresses which are learned from a port, and the network device 200 would reject any data packets with new source IP addresses that exceed the maximum number.
In one embodiment, the port security processor 242 will periodically poll ports for the learned IP addresses which are stored in the table to ensure that the host devices with the learned source IP addresses are still coupled to the port. If it is determined that a host device having the learned source IP address is no longer coupled to a port then source IP address for the host that is no longer present can be removed from the table so as to allow a new source IP address to have access on the port.
The network device 200 extends port security features beyond the MAC address filtering procedures that were used in prior layer 2 devices. The port security processor 242 allows source IP anti-spoofing protection to be activated selectively on a port-by-port basis. The port security processor 242 uses the source IP address detector 236 to automatically learn the source IP addresses for each host device attached to the port. To determine if the data packets received at a port contain a new source IP address that has not been learned, the ACL-CAM compares the source IP address and the MAC address in a received data packet, with the table of IP address/MAC address pairs.
When a new MAC Source Address is detected on a port by virtue of a received data packet identifying a new MAC source address, the source IP address detector 236 learns the association of source MAC address and the corresponding source IP address. Once the pair is learned, the ACL-CAM 240 is programmed with the information and switching of the network device proceeds to switch data packets normally.
The source IP address detector 236, can learn the source IP address for a host in a number of different ways. For example, the source IP address can be learned by using a reverse address resolution protocol (RARP) which provides for sending out the MAC address on the subnet, and in response an RARP server sends a data packet to identify the IP address which corresponds to the sent MAC address. Thus, listening to the RARP server communications can provide one way for determining a source IP address and MAC address pair. The source IP address detector 236 could also learn the IP address for a host by listening to the DHCP response packet being returned to the host. This response contains the source IP Address for the host. When a DHCP packet is detected, the entry in the table for the MAC address receiving the DHCP packet with a source IP address is cleared and the source IP address provided in the DHCP packet is loaded into the table. This utilization of the DHCP response works well where the port is set to allow for one IP address. It should be noted that if a port is set to allow for more than one IP address for the port, then relying on the DHCP response alone may be insufficient, as the DHCP response may not allow for an unambiguous correlation of the source IP address to the correct MAC address. However, this ambiguity could be resolved if the DHCP request and the DHCP response were both tracked. Another technique provides for watching for the IP header information in a data packet when the host first transmits a data packet through a port. If a static IP address is used and the port is set to 1 IP Address, the user can unplug the cable (causing a link down) to reset the table, or a timer can be used to clear the table. Another technique provides for trapping (listening to) ARP requests and ARP reply messages to learn the source IP address and MAC address pairs, and storing the pairs in ACL-CAM for each port.
In addition to the above, it should be recognized that care must be taken to learn the correct source IP address. For example, in order to support delayed technologies, such as the widely known IEEE 802.1X standard which may postpone IP Address assignment until the port is authenticated, a tiered, or delayed, approach is required to successfully detect the source IP address. This approach could allow for first identifying the MAC address and then waiting for an appropriate amount of time to learn the correct IP address. It is important to avoid learning the IP addresses assigned by Microsoft or Apple operating systems which may be provided to a host when a DHCP server cannot initially be found. It can be advantageous to delay IP address learning process until a certain amount of traffic has passed through the port. Further the risk of possibly learning the wrong IP address can be reduced by allowing an system administrator to seed the IP learning process with the IP address properties that are consistent with the subnet to which the host is coupled. For example, if the IP Subnet is 10.32.1.0/24, then this information can be used to seed the IP learning process and only match a MAC address with an IP addresses consistent with the subnet 10.32.1.0/24 addresses. This will eliminate false learning of a default 18.104.22.168 addresses assigned by Microsoft or Apple operating systems when a DHCP server is not initially located. It is also advantageous to confirm that the learned IP address is correct by performing a reverse IP check.
Once the learned IP address has been confirmed, and the IP address/MAC address pair has been stored in the ACL-CAM, blocking procedures are applied to the port. If there is more than one host device allowed per port, this process of determining MAC address and source IP address pairs will be repeated for each learned IP address on the port. Once a new source IP Address is confirmed, the inbound blocking procedures are applied to the port and includes the new source IP Address. Additional MAC address and IP address pairs will continue to be learned until the maximum number of MAC and IP Addresses is reached. The source IP anti-spoofing procedures should be compatible with existing MAC address port security and 802.1X Port Authentication features. In order to provide for compatibility the following order of execution can be used. First, MAC address port security is utilized, which confirms that a MAC address present on a port is a valid MAC address, and if it is not MAC port security procedures block data packets from the invalid MAC address. If 802.1X Port Authentication is enabled, the user will be prompted for the 802.1X user credentials to authenticate the port and either permit or deny data packet traffic based on the success or failure of the IEEE 802.1x authentication process. Source IP Security is then used, if enabled, to check if the maximum number of source IP addresses has been learned for a port. If the maximum number of source IP address has not been learned for the port, then the source IP address will be learned and confirmed, and the pairing of the source IP address with MAC address will be set in a table.
In order for the blocking to be efficient and fast, it should be implemented in hardware, such as a CAM, as opposed to using a CPU where the operation would be slower. The source IP anti-spoofing methods can provide for different types of security. For example, one aspect of the operation described herein provides for allowing an system administrator to set a maximum number of source IP addresses for a port. By limiting the number of the source IP addresses which can transmit data packets through a port of the network device 200, the risk of certain types of spoofing attacks (such as DoS attacks) can be prevented. This aspect of the operation provides for blocking of data packets at the port of the network device based on the source IP address contained in the data packet. For example, by limiting the number of source IP addresses on a port, an attacking host could only use a limited number of spoofed IP addresses before the maximum number of source IP addresses for the port would be exceeded.
A second operation of the network device 200 blocks data packets at the port, where the data packet contains a source MAC address and source IP address pair which does not match one of the previously identified MAC address/IP address pairs stored in the table. In this operation, a host device which is attempting to use a source IP address which does not match the correct source IP address for the MAC address will be blocked at the port. This second part of the operation provides for a high level of security against source IP spoofing attacks.
It should be noted that embodiments of the methods and systems herein can be provide for a significant amount of flexibility, which can provide a system administrators and ISPs with a powerful tool to combat source IP spoofing. For example, as discussed above, in one embodiment the number of source IP Addresses which can be associated with each switch port can be selected by an administrator. If more than one source IP address is permitted per port, then source IP spoofing is possible if the attacking host is using a validated MAC address, unless the source IP Security process as been activated to provide for port access based on correlating the learned source IP Address to its MAC address, such that access on a port is blocked, or permitted, based on the matching of the MAC/IP address pair in a received data packet with a MAC/IP address pair stored in a table. It should be recognized, however, that even without providing security based on the MAC/IP address pairs, some degree of protection against Source IP spoofing is provided by allowing the number of source IP addresses on the port to be controlled.
The port security processor 242 can also include a source IP age out timer 250. The port security processor 242 can allow an administrator to specify a time period for a source IP age-out timer. This timer can clear the ACL-CAM, or other possible table, of source IP addresses, every n seconds to allow the network device 200 to support downstream hubs and switches for multi-host configurations. If a timer were not provided then source IP addresses which were previously on the port might prevent new source IP addresses from gaining access to the port, where the maximum number of source IP addresses would be exceeded. In short, it would not be practical to maintain a link for a source IP address indefinitely. Where an administrator did not want to have a time out entry they could specify a zero “0” for the timer, and a default of 60 or 120 seconds or other appropriate time could be provided. Additionally, or alternatively, the source IP age out timer could also be flow based, which would provide that if the flow stops for a source IP address, for a period of n seconds, then the source IP address can be removed (aged out) from the table.
An embodiment of the system and method can also provide for capturing the information when a possible IP spoofing attempt has occurred. This information could then be used to generate syslog messages which could be transmitted and recorded in a log to record information regarding the operation of the system, including possible IP spoofing attempts.
As shown by the discussion above, it is important in many applications of the source IP security operations herein, that the table containing the learned source IP addresses be dynamic, such that the table can be updated so that timed out source IP addresses can be removed and new learned source IP addresses can be added to the table. Further, being able to change entries in the table allows for the fact that the source IP addresses assigned for a given host can change over time. This means that when the learned source IP addresses are stored in an ACL-CAM, these addresses should not be saved when a write only memory operation is performed.
The port security processor 242 should be programmed such that an administrator can view the source IP addresses learned and/or assigned to the port. Further, the IP security device should allow and administrator to view the setup and configuration of the timers and source IP address ACL's. The port security processor 242 should provide commands which allow an administrator to clear a single entry from the table, and to allow the administrator to clear all entries from the table. Further, debugging tools may also be provided to allow administrators to troubleshoot the security procedures for their particular environments.
In general in connection with the reverse IP checking described above, this type of operation may also be referred to as source IP checking. It should also be recognized that in some embodiments some source IP addresses will be statically configured. Where a source IP address is dynamically mapped, the source IP check can be done by sending out an ARP request to the host. If the response comes back and matches with the MAC address previously learned then the source IP check is successful. If the MAC address does not match then the source IP check has failed.
If the received data packet at the port has a MAC address which is new, then the source IP address for the received data packet is learned 414 using one of the processes described above. After the source IP address has been learned, a reverse IP check 416 is done to confirm the source IP address. If the reverse IP check is successful 418, then the table is programmed 420 with the IP address/MAC address pair, and the packet is passed 422. If the reverse IP check is not successful then the received data packet is blocked 424, or dropped at the port. It should also be recognized that some computers, or host workstations, may have firewalls which do not do not respond to RARP, or ICMP, or some other reverse IP techniques. Thus, in these situations the data flow from a host can be monitored to validate that the host is utilizing the proper MAC/IP address pair.
An embodiment herein provides for network device which includes layer 2 switching functions, where the switch provides for protection from spoofing of the Source IP address. The valid set of IP hosts, or subnets, can be configured statically, or learned dynamically by looking at the address information from various protocols, such as ARP and RARP, as discussed above. There can be provided two phases to the learning of the host addresses: the learning from the different control or data packets, and then validation of the learned information. Once the learned addresses are validated, the data packets from the validated source IP addresses will be forwarded. If the port security is enabled on the port then all other data packets from different source IP address will be dropped.
The security functions of an embodiment herein can be particularly advantageous when implemented on edge switches, or a riser switch feeding off from the edge switch, where the edge switches or riser switches are network devices that provide connectivity to different hosts connected to the subnet, and the data packets received by these switches contain both source IP and MAC addresses. This is illustrated in
In light of the above, it should be recognized that the anti-source IP spoofing function herein can advantageously be implemented on ports of the switches, as opposed to waiting to implement these functions at ports of the router. It should be noted that in implementation where a particular switch is not implementing anti source IP spoofing functions, then the router may need to do its own reverse source IP checking and validation, and further it will be recognized that a layer 2 switch will not be able to validate a host's source IP address when the host is connected to the system such that a router is positioned between the host and the layer 2 switch. This is because the layer 2 switch would typically see the MAC address of the router, rather than the MAC address of the host.
The Source IP Anti spoofing functions herein can co-exist with existing CAM-ACL features, such as, Flow Based functions, and Rule Based ACL functions, where flow based controls call for specific policies to be applied on host by host basis, and a rule based approach can allow for general or specific rules to be applied to groups of hosts, or ports. The implementation of the Source IP anti-spoofing functions can be done such that it is compatible with other features which can be provided in a network device, these features can include MAC address filtering; 802.1X port authentication; dynamic VLAN configuration; and dynamic user policies. Thus, the system and method herein allow for the learning and validation of source IP addresses, and for dynamically binding policies with the learned source IP addresses. Further, the filtering herein can be implemented in hardware, and can be applied to both dynamically learned source IP addresses and to statically assigned source IP addresses.
An embodiment herein can provide for generating system log information which records events regarding the learning and validation of source IP addresses. The learning and validation of the source IP addresses as well as the generation of system log information can consume the switches CPU processing power. Thus, in some applications it may be beneficial to provide additional features which will further reduce the amount of CPU processing required to implement the anti-source IP spoofing functions herein. One embodiment could provide a mirroring operation where information which would otherwise be processed by the CPU can be mirrored (transmitted) to another processing device which can share some of the processing demands with the CPU of the switch.
An additional aspect of the learning and validating the source IP addresses, is that controls and policies can be implemented not only on data packets coming into the switches, additionally outgoing policies can be applied on data packets being transmitted from a port. For example, a specific source IP address may be blocked from transmitting data packets through certain specified ports of the switch. An embodiment herein can also apply rate limiting policies, where the number of data packets transmitted to a particular host during a given time frame can be limited.
The source IP address for hosts connected to ports of a switch can be either statically configured, or learned dynamically. The learning of source IP addresses can provide for looking at the control packets, such as, ARP, RARP, DHCP, BOOTP, ICMP, etc. After the source IP address is initially learned the source IP address can be validated using RARP or ICMP procedures. Once a learned source IP address has been validated, the source IP address will be programmed into a CAM-ACL, and can be utilized in connection with layer 4 features that use the CAM. For example, these features can include rate limiting on certain ports, rate limiting for certain hosts, and providing for application control. Further as was the case with the above references to Layer 2 and Layer 3, Layer 4 is another functional layer of a network identified and discussed generally in the International Standards Organization, standard ISO/IEC 7498, which defines a 7-layer model for describing interconnected systems. It is referred to as the Open Systems Interconnection (OSI) model, and is incorporated herein by reference in its entirety. The Layer 4 is the transport layer which provides for transfer of data between hosts and flow control. Additional aspects of the learning of source IP address and L4 CAM programming are discussed below.
In many instance it will be desirable to assign certain hosts or devices of a network system with a static source IP address. A source IP address can be statically configured by an administrator of the system using a command line interface (CLI) of the network device. Examples of devices where is would be beneficial to provide a static IP address could include an application server, or database server, or source IP addresses for different network devices such as the switches or routers.
For dynamically assigned source IP addresses a number of different options can be used to determine the source IP address for a host. One of these options is to perform snooping of ARP requests. This snooping of ARP requests means that the switch will listen to ARP requests which are transmitted by hosts of the subnet, and then to the response to the ARP requests, and this response will include the MAC address and the source IP address for a host. After initially learning the MAC address and the source IP address for a host, the switch will probe or ping the host using ARP or ICMP to receive a confirmation that the host is actually responding to data packets sent to the learned source IP address. Once this has been confirmed, or validated the switch will identify the learned source IP address as valid, and record the Source IP address and corresponding MAC address in the CAM-ACL. During the transient state, which occurs after initially learning a new source IP address but prior to confirming the source IP as valid, the switch will continue to forward data packets with the new source IP addresses for the period of time, during which the validity of source IP addresses is being confirmed. If the source IP address is not confirmed as valid within a designated time period, then subsequent data packets having the new source IP address which has not been confirmed as valid will be dropped.
Another option for learning dynamically assigned source IP addresses, utilizes the fact that, in some systems, on boot-up a host on the subnet sends RARP broadcasts with its MAC address, and a RARP server responds with the source IP to be used by the host having the MAC address in the RARP broadcast. By listening to the RARP response from the RARP server, the source IP address can be learned by monitoring the RARP response on the port where the corresponding host having the corresponding MAC is coupled.
As discussed above the data packets from the DHCP server can also be analyzed to determine the assigned source IP address. The operation of some computer networks provide that a host and a DHCP server exchange DHCP messages by which the DHCP server assigns an IP address to the host. In such a network, the network device, switch, of the present invention with the source IP protection enabled, can listen to the DHCP messages and learn the IP address assigned to a host by the DHCP server.
Some systems will utilize BOOTP data packets; and the general operation in connection with BOOTP data packets is the same as for the DHCP operation. In the BOOTP systems on boot-up, a host sends a bootp broadcast message with its MAC address. The Bootp server responds with the IP address for that MAC address. By snooping into (analyzing) the BOOTP server response the IP address can be learned for that particular port on which the MAC address was learned.
Additionally, the source IP address can be learned by temporarily retaining a data packet transmitted by a host, and then generating an ARP request and waiting for an ARP response from the host to confirm the source IP address.
As discussed above the system and method herein also provide for monitoring an aging of the source IP address. A method of an embodiment herein would provide that statically configured Source IP Addresses on the subnets are never aged out. These static source IP addresses would be removed when they have been removed from the subnet configuration. For dynamically assigned and learned source IP addresses, the method can provide for aged source IP to be removed.
Layer4 CAM Programming
The network device can provide two variations for the layer 4 (L4) CAM-ACL programming. One of these variations provides for rule based control where groups of source IP addresses are provided with rule defined access through the network to other addresses. A second variation, is a flow based model where specific source IP address are provided with certain flow protocols determined on a source IP address specific basis. An embodiment herein provides for programming a Layer4 CAM-ACL entry with the source IP as one of the specified addresses on the port. In one implementation there is support for the Rule based CAM-ACL programming using hardware filtering, features such as TOS/DSCP honoring (e.g. providing a specified quality of service QOS or type of service TOS), marking (such prioritizing traffic or packet types), and rate limiting. (DSCP stands for Differential Service Code Point. It is a 6 bit value in an IP header that can serve as a quality of service information for the switch, and it can be advantageous to allow the network device to change the value of the DSCP).
In the absence of any specific ACL bound rules applied to the port, the switch will be programmed for a session entry to forward all the IP traffic with the validated source IP addresses, and deny all other source IP traffic. This rule would typically be applied for every new IP source learned on the switch.
In the Layer4 CAM programming, there is an implicit Source IP/Subnet clause for the configured or learned source address of the trusted subnet. The extended ACL will not have a source <clause> of its own for a port that is configured with this feature. Thus, where a source IP and MAC address pair has been learned and verified then groups of ACL rules or clauses from the CAM can be applied to the learned source IP address.
Rule Based ACL
When a rule based ACL group using extended ACL is configured, rules which are pre-programmed into the CAM can be applied to learned and verified addresses. The extended ACL can operate to provide a number of functions, including operating to restrict application services. This programming can then be repeated, or updated, with an implicit permit Source IP clause for each secured host source IP address. A secured host source IP address could be a source IP address which has been learned and validated or it could be a statically assigned source IP address.
In one embodiment if the Source IP addresses are configured statically, whenever an ACL clause (e.g. a policy rule) is bound to a port, the system will program the clauses with an implicit Source IP permit clause. Once the ACL entry for the statically configured address is unbound from the port, the CAM associated with the ACL entry will be removed. Thus, in this manner IP/MAC address pairs can be removed from the CAM-ACL.
In one embodiment, for a dynamically learned source IP Address, the system will have to re-program all the ACL clauses for each Source IP Address learned with an implicit source IP permit clause added to them. If the protocol mechanism (such as the validation process) or aging process, decides that a dynamically source IP address is not to be used any more, the specific Source IP address is removed from the ACL, which can make space available for a new source IP address.
Statically Configured Addresses
When the secured hosts are statically configured, the host addresses are programmed in the CAM and only traffic from these statically configured addresses are permitted on the configured ports. All other IP traffic is dropped. The learning control packets such as DHCP, BOOTP will still be processed and forwarded via the CPU of the switch. The L4 CAM-ACL for the statically configured host address will reside in the bank that gets matched prior to the Rule CAMs.
If there is a conflict between the statically configured addresses and the Rule based ACL, the statically configured addresses will take precedence. In such cases, it may be desirable to have only one or the other, but not both (i.e. to provide either the statically configured CAM or the rule based ACL but not both).
Rule Based ACL
Each rule based ACL will operate to provide a keyword of “secured-host” which will be applied to a learned and validated source IP address for hosts. All other source IP addresses will be denied. Any other ACL rule without the keyword will be used as is, which means that other ACL rules will be applied to data packets received on the ports without alteration, but notably if a source IP address is not designated as a secure host then it will dropped, so none of the ACL rules would be applied to it.
Command Line Interface
Provided herein below are some examples of the syntax of code which can be generated via an interface between user, such as system administrator, and the CPU of the switch which controls the operation of the switch, and the programming of the CAM-ACL.
The ACL will provide for use of a keyword, “secured-host” which can be used to identify source IP addresses which have been learned and validated. The user can configure the ACL with this as the source subnet.
The language below shows exemplary syntax from an embodiment of command line interface for switch where different key words are defined and specifically the last line shows the designation of “secured host” as applying to secure IP hosts.
>ip access-list extended
>permit ip ?
A.B.C.D or A.B.C.D/L
IP address/Subnet mask
Any destination host
A single destination host
Secure IP hosts
As discussed above the anti source IP spoofing functions herein can be enabled on a port by port basis. At the port, or interface, level the syntax utilized in connection with the command line interface for a switch is shown as follows for enabling the anti-spoofing feature on an interface, where the last two lines of this text corresponds to the command for enabling the anti-spoofing functions.
Configure source ip security for
In one embodiment the dynamic learning of source IP addresses is enabled by default, but commands will be available to disable the dynamic learning. In addition other options for configuration could include:
Number of Allowed source IP Addresses
Network to be trusted to learn IP address
Much of the configuration above pertains to configurations implemented at the interface or port level. Additionally a number of configurations can be applied at global level to multiple interfaces, or ports of a switch. The language below shows command line interface text associated with globally configuring the switch for different aspects of function such as setting a max-age out time for a source IP address, setting the maximum number of IP addresses per port, the disabling of the aging function of port, and other configuration commands. Of course these configurations could also be applied on a port by port basis if a user desired to do so.
MON-SW-BigIron Router (config)#srcip ?
Age out time for learned sourceIP entries
Maximum number of addresses to learn
Network to be trusted to learn IP address
Disables dynamic learning of IP Addresses
Given the above operation of the system, it is clear that at times it can be advantageous for a system administrator user to be able to view information regarding the status and configuration of the system relative to implementation of the security functions disclosed herein. A review of some of the tables and information which are available to a user of an embodiment of the system herein is provided to further illustrate aspects of an embodiment of the system herein.
For example using a command in the command line interface of “sh srcip-sec-table” can display all the IP addresses learned or currently being learned on all ports which have srcip-security enabled. An example of such a table is shown below.
BigIron Router#sh srcip-sec-table
As shown the above table indicates total entries = 4 total learnt entries = 3.
The show srcip-sec-table command can also provide for a view of other aspects of the system such as the status of an IP address, a configuration or the status of specific port the basic elements of the commands are shown below.
MON-SW-BigIron Router#sh srcip
Display the sourceIp-security configuration
A specific command for viewing the table for a specific source IP address 22.214.171.124 is shown below.
MON-SW-BigIron Router#sh srcip 126.96.36.199
HashT: Total Number of learnt SrcIp + MAC entries = 1
A specific command for viewing a table for viewing security configurations is shown below, where a switch is configured such that the security procedures are enabled and the number of source IP addresses per port is set at 64.
A specific command for viewing a table for showing the status of source IP addresses for a specific port 4/20 of switch is shown below.
MON-SW-BigIron Router#sh srcip e 4/20
Total entries = 3 total learnt entries = 3
The language below shows the commands and table for a specific address which includes 25 and is on interface 4/20.
MON-SW-BigIron Router#sh srcip e 4/20 | incl 25
During the course of operation of the network device herein there may be times when it is desired to clear learned hosts. Commands can be provided specifically for clearing the CAM-ACL of the learned and validated source IP addresses. Additionally, statically configured hosts can be removed when the user removes them from the configuration from the specified vlan.
The language shown below provides for clearing all learned source IP addresses from a table.
MON-SW-BigIron Router#clear srcip?
Flush the srcip security table
The language shown below provides for clearing a specific learned source IP addresses from a table.
MON-SW-BigIron Router#clear srcip ?
MON-SW-BigIron Router#clear srcip 188.8.131.52
The language shown below provides for clearing selected source IP addresses from a table.
MON-SW-BigIron Router#sh srcip
Total entries = 2 total learnt entries = 2
The language below can be used to provide commands to clear all the learned hosts from the specified interface.
It should be noted that the numerous examples of command language provided above are merely illustrative. One of skill in the art will recognize that the specific command language can be varied, as can different aspects of the network devices operation, and still be such that it is with the scope of the general teaching herein.
The above described system and method is very flexible and can provide for a range of different implementation. For example, where desired the source IP address can be validated against the subnet. The system can also provide for a trusted-subnet that the user can configure.
In order to minimize the demands placed on the CPU of the switch, data packets with source IP packets which do not pass the security procedures herein can be dropped, without maintaining a record of which source IP addresses have been dropped. However, other embodiments can provide a log of denied packets. In order to keep a record of discarded packets, but still provide for some protection of the CPU resources, the operation can provide for forwarding discarded packets to a mirror port.
However, if the number of new source IP addresses that cannot be validated exceeds a threshold number, then the system will go into a possible attack mode 810. In the possible attack mode the system will operate to drop all data packets coming from new source IP addresses. This means that new source IP address and MAC address pairs will not be added to the CAM-ACL while the system is in a possible attack mode. Further, while in this mode the system will not attempt to validate new source IP addresses. This possible attack mode functions to protect the CPU from becoming overloaded with trying to validate an exceptionally high number of new source IP addresses, which could occur when a spoofed source IP address attack is occurring.
At the step of determining if the number source IP addresses which cannot be validated is high, the system can utilize a predetermined threshold number for an allowable number of unsuccessful validation attempts. This predetermined number could be input by a system administrator. Alternatively, instead of using a predetermined threshold number, the system could provide for a degree of self monitoring and learning, such that the system will observe historic operation of the system to determine, based on past operation, an expected number of unsuccessful validation attempts for a given time period on a given port.
Another aspect of an embodiment herein is that it allows for dynamic application of forwarding policy or rules. The forwarding of packets on a network device including switching functionality can be based, for example, on the destination MAC address. The policy based forwarding extends the forwarding criteria to include the protocol type, the application ports, such as, UDP/TCP ports, MTU, rate-limiting etc. For example, certain types of data packet protocols could be restricted from being transmitted to devices on certain ports. Or newly learned source IP addresses may be restricted from transmitting or receiving data from devices on other ports of the system. These policies can be extended to hosts learned as a result of the dynamic learning and validation procedures. The forwarding criteria can augmented with the newly learned and validated source IP address, or with statically MAC address/IP address pairs. The traffic from the validated hosts automatically uses the forwarding policies. The traffic from other dynamic source IP Addresses which fail to be validated would be discarded.
The switching device can allow a user to configure forwarding policies so that a user can specify the subset of data traffic which passes these forwarding policies will be forwarded, while other data traffic that does not pass the forwarding policies will be discarded or dropped.
These forwarding policies are configured using the Extended Access Control Lists, where a user could choose the specific hosts, specific subnets for source and destination ip addresses, specific application ports for UDP/TCP, etc.
The Source IP Anti-spoofing will restrict the forwarding decisions to apply to only a subset of hosts that are considered to be validated. The traffic from all other hosts will get discarded. The forwarding policies are modified when the hosts are validated using the validation techniques discussed above.
The following example illustrates the forwarding policy and its modification to the set of validated hosts.
Access-list 120 permit udp any host 10.10.10.1
Access-list 120 deny ip any any
The above access-list will permit any UDP application traffic to the destination of 10.10.10.1. All other traffic is discarded. The above access-list does not specify the source ip address that should be allowed. Thus the forwarding policy will apply source IP addresses, and apply this to all the source ip addresses.
With the Source-IP Anti spoofing running, say only the hosts 184.108.40.206, 220.127.116.11 and 18.104.22.168 are validated. All other hosts are denied. Thus, the above access-list will now only allow the forwarding from the above hosts, with UDP application port, and to destination address of 10.10.10.1. All other source ip addresses, such as, 22.214.171.124 etc. will be discarded even if they have the UDP protocol type, and to the destination address of 10.10.10.1.
In one embodiment forwarding policies are defined to alter, or control, data packet forwarding based on criteria which can be defined, or modified, by a system administrator. In this embodiment ACLs are used to specify this forwarding criterion. The example below illustrates simple forwarding criteria using the ACL.
Ip access-list extend 111
permit secure-host any
deny ip any any
The above clause will allow packets from validated hosts to go through. The rest of the traffic is denied. This criteria would apply to hosts on the subnet where this ACL criteria is applied.
When Source-IP Anti-spoofing is applied, the anti-spoofing procedures validate a list of hosts on the subnet that are considered valid. Once the hosts are validated, the above forwarding policies applied via the ACL are modified. The ACL is extended to include only the set of validated hosts.
This operation allows a system administrator to continue to use the forwarding policies of the ACL, and the system administrator does not have to modify the forwarding policy for each validated host. Instead, the policies are automatically extended/modified to allow the traffic from valid hosts. On a large network with several subnets, this saves the user from having to modify their policy for each host.
While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example, and not limitation. It will be apparent to persons skilled in the relevant art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention. This is especially true in light of technology and terms within the relevant art(s) that may be later developed. Thus, the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4897874||Mar 31, 1988||Jan 30, 1990||American Telephone And Telegraph Company At&T Bell Laboratories||Metropolitan area network arrangement for serving virtual data networks|
|US5237614||Jun 7, 1991||Aug 17, 1993||Security Dynamics Technologies, Inc.||Integrated network security system|
|US5721780||May 31, 1995||Feb 24, 1998||Lucent Technologies, Inc.||User-transparent security method and apparatus for authenticating user terminal access to a network|
|US5757924||Sep 18, 1995||May 26, 1998||Digital Secured Networks Techolognies, Inc.||Network security device which performs MAC address translation without affecting the IP address|
|US5774551||Aug 7, 1995||Jun 30, 1998||Sun Microsystems, Inc.||Pluggable account management interface with unified login and logout and multiple user authentication services|
|US5825890||Jul 1, 1997||Oct 20, 1998||Netscape Communications Corporation||Secure socket layer application program apparatus and method|
|US5892903||Sep 12, 1996||Apr 6, 1999||Internet Security Systems, Inc.||Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system|
|US5894479||Dec 10, 1996||Apr 13, 1999||Intel Corporation||Providing address resolution information for self registration of clients on power-up or dial-in|
|US5946308||Oct 30, 1997||Aug 31, 1999||Cabletron Systems, Inc.||Method for establishing restricted broadcast groups in a switched network|
|US5958053||Aug 22, 1997||Sep 28, 1999||At&T Corp.||Communications protocol with improved security|
|US6167052||Apr 27, 1998||Dec 26, 2000||Vpnx.Com, Inc.||Establishing connectivity in networks|
|US6167445||Oct 26, 1998||Dec 26, 2000||Cisco Technology, Inc.||Method and apparatus for defining and implementing high-level quality of service policies in computer networks|
|US6212191||Jan 30, 1998||Apr 3, 2001||International Business Machines Corporation||Method and system for providing security to asynchronous transfer mode emulated local-area networks|
|US6256314||Aug 11, 1998||Jul 3, 2001||Avaya Technology Corp.||Apparatus and methods for routerless layer 3 forwarding in a network|
|US6338089||Mar 31, 1999||Jan 8, 2002||Bull Hn Information Systems Inc.||Method and system for providing session pools for high performance web browser and server communications|
|US6339830||Mar 15, 2000||Jan 15, 2002||Alcatel Internetworking, Inc.||Deterministic user authentication service for communication network|
|US6363489||Nov 29, 1999||Mar 26, 2002||Forescout Technologies Inc.||Method for automatic intrusion detection and deflection in a network|
|US6393484||Apr 12, 1999||May 21, 2002||International Business Machines Corp.||System and method for controlled access to shared-medium public and semi-public internet protocol (IP) networks|
|US6519646||Sep 1, 1998||Feb 11, 2003||Sun Microsystems, Inc.||Method and apparatus for encoding content characteristics|
|US6553028||Apr 30, 1999||Apr 22, 2003||Cisco Technology, Inc.||Method and apparatus for multicast switching using a centralized switching engine|
|US6732270||Oct 23, 2000||May 4, 2004||Motorola, Inc.||Method to authenticate a network access server to an authentication server|
|US6751728||Jun 16, 1999||Jun 15, 2004||Microsoft Corporation||System and method of transmitting encrypted packets through a network access point|
|US6771649||Dec 6, 1999||Aug 3, 2004||At&T Corp.||Middle approach to asynchronous and backward-compatible detection and prevention of ARP cache poisoning|
|US6775290||May 24, 1999||Aug 10, 2004||Advanced Micro Devices, Inc.||Multiport network switch supporting multiple VLANs per port|
|US6807179||Apr 18, 2000||Oct 19, 2004||Advanced Micro Devices, Inc.||Trunking arrangement in a network switch|
|US6874090||Jun 21, 2001||Mar 29, 2005||Alcatel||Deterministic user authentication service for communication network|
|US6892309||Feb 8, 2002||May 10, 2005||Enterasys Networks, Inc.||Controlling usage of network resources by a user at the user's entry point to a communications network based on an identity of the user|
|US6907470||Jun 28, 2001||Jun 14, 2005||Hitachi, Ltd.||Communication apparatus for routing or discarding a packet sent from a user terminal|
|US6912592||Jan 5, 2001||Jun 28, 2005||Extreme Networks, Inc.||Method and system of aggregate multiple VLANs in a metropolitan area network|
|US6950628||Aug 2, 2002||Sep 27, 2005||Cisco Technology, Inc.||Method for grouping 802.11 stations into authorized service sets to differentiate network access and services|
|US6980515||Feb 23, 2000||Dec 27, 2005||Alcatel||Multi-service network switch with quality of access|
|US7028098||Jul 20, 2001||Apr 11, 2006||Nokia, Inc.||Selective routing of data flows using a TCAM|
|US7062566||Oct 24, 2002||Jun 13, 2006||3Com Corporation||System and method for using virtual local area network tags with a virtual private network|
|US7088689 *||Dec 21, 2001||Aug 8, 2006||Lg Electronics Inc.||VLAN data switching method using ARP packet|
|US7134012 *||Aug 15, 2001||Nov 7, 2006||International Business Machines Corporation||Methods, systems and computer program products for detecting a spoofed source address in IP datagrams|
|US7188364||Jan 25, 2002||Mar 6, 2007||Cranite Systems, Inc.||Personal virtual bridged local area networks|
|US7194554||Oct 20, 2000||Mar 20, 2007||Nomadix, Inc.||Systems and methods for providing dynamic network authorization authentication and accounting|
|US7234163 *||Sep 16, 2002||Jun 19, 2007||Cisco Technology, Inc.||Method and apparatus for preventing spoofing of network addresses|
|US7249374||Jan 22, 2001||Jul 24, 2007||Cisco Technology, Inc.||Method and apparatus for selectively enforcing network security policies using group identifiers|
|US7360086||Dec 6, 1999||Apr 15, 2008||Hitachi, Ltd.||Communications control method and information relaying device for communications network system|
|US20020065938 *||May 15, 2001||May 30, 2002||Jungck Peder J.||Edge adapter architecture apparatus and method|
|US20020133534||Jan 8, 2001||Sep 19, 2002||Jan Forslow||Extranet workgroup formation across multiple mobile virtual private networks|
|US20020146002||Jul 24, 2001||Oct 10, 2002||Takayuki Sato||Network administration apparatus, network administrating program, network administrating method and computer network system|
|US20030028808||Jul 16, 2002||Feb 6, 2003||Nec Corporation||Network system, authentication method and computer program product for authentication|
|US20030037163||Mar 8, 2002||Feb 20, 2003||Atsushi Kitada||Method and system for enabling layer 2 transmission of IP data frame between user terminal and service provider|
|US20030043763||Jul 29, 1998||Mar 6, 2003||Paul D Grayson||Wireless networked message routing|
|US20030056001||Jul 20, 2001||Mar 20, 2003||Ashutosh Mate||Selective routing of data flows using a TCAM|
|US20030056063||Sep 17, 2001||Mar 20, 2003||Hochmuth Roland M.||System and method for providing secure access to network logical storage partitions|
|US20030065944||Sep 28, 2001||Apr 3, 2003||Mao Yu Ming||Method and apparatus for implementing a layer 3/layer 7 firewall in an L2 device|
|US20030067874||Apr 22, 2002||Apr 10, 2003||See Michael B.||Central policy based traffic management|
|US20030105881||Dec 3, 2001||Jun 5, 2003||Symons Julie Anna||Method for detecting and preventing intrusion in a virtually-wired switching fabric|
|US20030142680||Dec 30, 2002||Jul 31, 2003||Naoki Oguchi||Device, network, and system for forwarding frames between geographically dispersed user networks|
|US20030217151||Feb 28, 2003||Nov 20, 2003||Roese John J.||Location based data|
|US20040003285||Jun 28, 2002||Jan 1, 2004||Robert Whelan||System and method for detecting unauthorized wireless access points|
|US20040160903||Feb 13, 2003||Aug 19, 2004||Andiamo Systems, Inc.||Security groups for VLANs|
|US20040213172||Apr 24, 2003||Oct 28, 2004||Myers Robert L.||Anti-spoofing system and method|
|US20040255154||Jun 11, 2003||Dec 16, 2004||Foundry Networks, Inc.||Multiple tiered network security system, method and apparatus|
|US20050025125||Aug 1, 2003||Feb 3, 2005||Foundry Networks, Inc.||System, method and apparatus for providing multiple access modes in a data communications network|
|US20050055570||Sep 4, 2003||Mar 10, 2005||Foundry Networks, Inc.||Multiple tiered network security system, method and apparatus using dynamic user policy assignment|
|US20050091313||Aug 28, 2002||Apr 28, 2005||Peng Zhou||System and implementation method of controlled multicast|
|US20050185626||Apr 15, 2005||Aug 25, 2005||Meier Robert C.||Method for grouping 802.11 stations into authorized service sets to differentiate network access and services|
|US20050254474||Jun 29, 2005||Nov 17, 2005||Iyer Pradeep J||System and method for monitoring and enforcing policy within a wireless network|
|US20060028996||Aug 9, 2004||Feb 9, 2006||Huegen Craig A||Arrangement for tracking IP address usage based on authenticated link identifier|
|US20060155853||Nov 6, 2002||Jul 13, 2006||Peter Nesz||Method and arrangement for preventing illegitimate use of ip addresses|
|US20070220596||Nov 3, 2006||Sep 20, 2007||Keeler James D||Authorization and authentication of user access to a distributed network communication system with roaming feature|
|1||Alcatel Internetworking, Inc., "Authenticated VLANs: Secure Network Access at Layer 2," An Alcatel White Paper, Nov. 2002, pp. 1-14.|
|2||Cisco Systems, Inc., Ch. 20, "Configuring Port-Based Traffic Control," Catalyst 3550 Multilayer Switch Software Configuration Guide, Cisco IOS Release 12.1 (13) EA1, Mar. 2003, pp. 1-14.|
|3||Cisco Systems, Inc., Ch. 27, "Configuring Network Security with ACLs," Catalyst 3550 Multilayer Switch Software Configuration Guide, Cisco IOS Release 12.1 (13) EA1, Mar. 2003, pp. 1-48.|
|4||Cisco Systems, Inc., Ch. 9, "Configuring 802.1X Port-Based Authentication," Catalyst 3550 Multilayer Switch Software Configuration Guide, Cisco IOS Release 12.1 (13) EA1, Mar. 2003, pp. 1-18.|
|5||Congdon, P. et al., "IEEE 802.1X Remote Authentication Dial in User Services (RADIUS) Usage Guidelines," The Internet Society, 2003, 30 pages, obtained from http://www.faqs.org/ftp/rfc/pdf/rfc3580.txt.pdf.|
|6||Final Office Action mailed May 28, 2008 in U.S. Appl. No. 10/631,091.|
|7||Final Office Action mailed Oct. 10, 2007 in U.S. Appl. No. 10/631,366.|
|8||http://www.anml.iu.edu/PDF/Automatic-Spoof-Detector.pdf, entitled "Automatic Spoof Detector (aka Spoofwatch)," dated Jan. 28, 2002, printed Jul. 23, 2003, 2 pages in length.|
|9||http://www.cert.org/incident-notes/IN-2000-04.html, entitled "CERT(R) Incident Note IN-2000-04 (Denial of Service Attacks using Nameservers)," printed Jul. 23, 2003, 3 pages in length.|
|10||http://www.cisco.com/en/US/products/hw/switches/ps574/products-configuration-guide-chapter 09186a008007ef90.html#x tocid3 (PDF & web pages), entitled "Cisco Catalyst 1900 Series Switches," printed Jul. 29, 2003, 13 pages in length.|
|11||http://www.cisco.com/en/US/products/sw/iosswrel/ps1839/products-feature-guide09186a00801543c8.html#1027177 (PDF & web pages), entitled "Cisco IOS Software Releases 12.2 T," printed Jul. 29, 2003, 26 pages in length.|
|12||http://www.cisco.com/en/US/tech/tk648/tk361/technologies-tech-note09186a0080094adb.shtml (PDF & Web pages), entitled "IP Addressing Services," printed Jul. 29, 2003, 10 pages in length.|
|13||http://www.cisco.com/en/US/tech/tk86/tk803/technologies-tech-note09186a00800a7828.shtml (PDF & web pages), entitled "Cisco-Cable Source-Varify and IP Address Security," printed Jul. 23, 2003, 25 pages in length.|
|14||http://www.extremenetworks.com/libraries/prodpdfs/products/ex-ware-tech-brief.pdf (Extreme Networks PDF), entitled "Tech Brief ExtremeWare 6.2," printed Jul. 29, 2003, 8 pages in lengh.|
|15||http://www.extremenetworks.com/libraries/prodpdfs/products/UnifiedWireless.asp (Extreme Networks PDF & web pages), entitled: Unified Access Architecture for Wired and Wireless Networks, printed Jul. 29, 2003, 10 pages in length.|
|16||http://www.legions.org/kv/kv7.txt, entitled "Keen Veracity Legions of the Underground Issue #,:" printed Jun. 24, 2003, pp. 1-41.|
|17||http://www.linuxgazette.com/issue63/sharma.html, entitled "IP Spoofing," printed Jul. 23, 2003, 3 pages in length.|
|18||http://www.networkcommand.com/docs/ipspoof.txt, entitled "[IP-spoofing Demystified ] (Trust-Relationship Exploitation)," Jun. 1996, printed May 18, 2003, pp. 1-9.|
|19||http://www.sans.org/rr/threats/spoofed.php (PFD and web pages), entitled Spoofed IP Address Distributed Denial of Service Attacks: Defense-in-Depth, printed Jul. 23, 2003, 7 pages in length.|
|20||IEEE, The Institute of Electrical and Electronics Engineers, Inc., "Port-Based Network Access Control", 2001, pp. 1-134.|
|21||In re U.S. Appl. No. 10/458,628, filed Jun. 11, 2003, by Philip Kwan et al., entitled "Multiple Tiered Network Security System, Method and Apparatus," 33 pages in length.|
|22||In re U.S. Appl. No. 10/631,091, filed Jul. 31, 2003, by Kwan, entitled "System and Method for ARP Anti-Spoofing Security".|
|23||In re U.S. Appl. No. 10/631,366, filed Jul. 31, 2003, by Kwan, entitled "System and Method for Source IP Anti-Spoofing security".|
|24||In re U.S. Appl. No. 10/631,898, filed Aug. 1, 2003, by Philip Kwan, entitled "System, Method and Apparatus for Providing Multiple Access Modes in a Data Communications Network," 37 pages in length.|
|25||In re U.S. Appl. No. 10/654,417, filed Sep. 4, 2003, by Philip Kwan et al., entitled "Multiple Tiered Network Security System, Method and Apparatus Using Dynamic User Policy Assignment," 36 pages in length.|
|26||Microsoft, "Recommendations for IEEE 802.11 Access Points," Apr. 2, 2002, pp. 1-16, obtained from http://www.microsoft.com/whdc/device/network/802x/AccessPts/mspx.|
|27||Non Final Office Action mailed Feb. 2, 2007 in U.S. Appl. No. 10/631,366.|
|28||Non Final Office Action mailed Jan. 12, 2007 in U.S. Appl. No. 10/631,091.|
|29||Non Final Office Action mailed Jul. 17, 2008 in U.S. Appl. No. 10/631,366.|
|30||*||Pfleeger (Charles P. Pfleeger, "Security in computing", 2nd edition, 1996, ISBN: 0133374866, p. 426-434.|
|31||Schmid et al., "An Access Control Architecture for Microcellular Wireless IPv6 Networks," Proceeding of 26th Annual IEEE Conference on Local Computer Networks, 2001, pp. 454-463.|
|32||U.S. Appl. No. 10/668,455, filed Sep. 23, 2003, Szeto.|
|33||U.S. Appl. No. 10/925,155, filed Aug. 24, 2004, Kwan.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7562390||Jul 31, 2003||Jul 14, 2009||Foundry Networks, Inc.||System and method for ARP anti-spoofing security|
|US7757285 *||Sep 21, 2005||Jul 13, 2010||Fujitsu Limited||Intrusion detection and prevention system|
|US7774833||Sep 23, 2003||Aug 10, 2010||Foundry Networks, Inc.||System and method for protecting CPU against remote access attacks|
|US7788720 *||May 16, 2006||Aug 31, 2010||Cisco Technology, Inc.||Techniques for providing security protection in wireless networks by switching modes|
|US7802296 *||Aug 23, 2006||Sep 21, 2010||Cisco Technology, Inc.||Method and system for identifying and processing secure data frames|
|US7969966 *||Dec 19, 2005||Jun 28, 2011||Alcatel Lucent||System and method for port mapping in a communications network switch|
|US7979903||Feb 25, 2009||Jul 12, 2011||Foundry Networks, Llc||System and method for source IP anti-spoofing security|
|US8006304||Jun 4, 2009||Aug 23, 2011||Foundry Networks, Llc||System and method for ARP anti-spoofing security|
|US8181249 *||Feb 29, 2008||May 15, 2012||Alcatel Lucent||Malware detection system and method|
|US8200798 *||Feb 7, 2008||Jun 12, 2012||Cisco Technology, Inc.||Address security in a routed access network|
|US8233454 *||Jul 28, 2009||Jul 31, 2012||Canon Kabushiki Kaisha||Communication system and method for switching between wireless connections|
|US8239929 *||Apr 28, 2010||Aug 7, 2012||Foundry Networks, Llc||Multiple tiered network security system, method and apparatus using dynamic user policy assignment|
|US8245300||Jun 4, 2009||Aug 14, 2012||Foundry Networks Llc||System and method for ARP anti-spoofing security|
|US8249096||Aug 26, 2010||Aug 21, 2012||Foundry Networks, Llc||System, method and apparatus for providing multiple access modes in a data communications network|
|US8387129 *||Jun 9, 2008||Feb 26, 2013||Qualcomm Incorporated||Method and apparatus for verifying data packet integrity in a streaming data channel|
|US8417776 *||Aug 25, 2008||Apr 9, 2013||Vere Software, Inc.||Online evidence collection|
|US8528071||Aug 24, 2004||Sep 3, 2013||Foundry Networks, Llc||System and method for flexible authentication in a data communications network|
|US8533823||Feb 25, 2009||Sep 10, 2013||Foundry Networks, Llc||System and method for source IP anti-spoofing security|
|US8681800||May 1, 2012||Mar 25, 2014||Foundry Networks, Llc||System, method and apparatus for providing multiple access modes in a data communications network|
|US8699489 *||Dec 22, 2010||Apr 15, 2014||Telefonaktiebolaget L M Ericsson (Publ)||Method and arrangement for transferring data packets|
|US8769373||Oct 5, 2010||Jul 1, 2014||Cleon L. Rogers, JR.||Method of identifying and protecting the integrity of a set of source data|
|US8788823 *||Oct 22, 2004||Jul 22, 2014||Cisco Technology, Inc.||System and method for filtering network traffic|
|US8789171 *||Mar 26, 2008||Jul 22, 2014||Microsoft Corporation||Mining user behavior data for IP address space intelligence|
|US8893256||Jun 30, 2010||Nov 18, 2014||Brocade Communications Systems, Inc.||System and method for protecting CPU against remote access attacks|
|US8904514||Apr 12, 2010||Dec 2, 2014||Hewlett-Packard Development Company, L.P.||Implementing a host security service by delegating enforcement to a network device|
|US8909795 *||Jun 8, 2005||Dec 9, 2014||Naver Corporation||Method for determining validity of command and system thereof|
|US8918875||Jul 18, 2011||Dec 23, 2014||Foundry Networks, Llc||System and method for ARP anti-spoofing security|
|US20050235065 *||Sep 15, 2004||Oct 20, 2005||Nokia Corporation||Method, network element, and system for providing security of a user session|
|US20060090196 *||Oct 21, 2004||Apr 27, 2006||Van Bemmel Jeroen||Method, apparatus and system for enforcing security policies|
|US20090249480 *||Mar 26, 2008||Oct 1, 2009||Microsoft Corporation||Mining user behavior data for ip address space intelligence|
|US20090257434 *||Jun 29, 2009||Oct 15, 2009||Huawei Technologies Co., Ltd.||Packet access control method, forwarding engine, and communication apparatus|
|US20100027459 *||Jul 28, 2009||Feb 4, 2010||Canon Kabushiki Kaisha||Communication system and method for controlling the same|
|US20120163382 *||Dec 22, 2010||Jun 28, 2012||Telefonaktiebolaget L M Ericsson||Method and Arrangement for Transferring Data Packets|
|US20130254891 *||Dec 2, 2011||Sep 26, 2013||Osamu Onoda||Computer system, controller and network monitoring method|
|WO2011029361A1 *||Aug 10, 2010||Mar 17, 2011||Zte Corporation||Method, device and switch chip for reducing utilization rate of central processing unit of switch|
|U.S. Classification||726/22, 726/11, 726/23, 726/13|
|Cooperative Classification||H04L63/1441, H04L63/0263, H04L63/101, H04L2463/146|
|European Classification||H04L63/02B6, H04L63/10A, H04L63/14D|
|Sep 20, 2004||AS||Assignment|
Owner name: FOUNDRY NETWORKS, INC., CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SZETO, RONALD W.;JAIN, NITIN;SURESH, RAVINDRAN;AND OTHERS;REEL/FRAME:015794/0889;SIGNING DATES FROM 20040805 TO 20040911
|Dec 22, 2008||AS||Assignment|
Owner name: BANK OF AMERICA, N.A. AS ADMINISTRATIVE AGENT,CALI
Free format text: SECURITY AGREEMENT;ASSIGNORS:BROCADE COMMUNICATIONS SYSTEMS, INC.;FOUNDRY NETWORKS, INC.;INRANGE TECHNOLOGIES CORPORATION;AND OTHERS;REEL/FRAME:022012/0204
Effective date: 20081218
|Jan 20, 2010||AS||Assignment|
Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATE
Free format text: SECURITY AGREEMENT;ASSIGNORS:BROCADE COMMUNICATIONS SYSTEMS, INC.;FOUNDRY NETWORKS, LLC;INRANGE TECHNOLOGIES CORPORATION;AND OTHERS;REEL/FRAME:023814/0587
Effective date: 20100120
|Jul 21, 2010||AS||Assignment|
Owner name: FOUNDRY NETWORKS, LLC, CALIFORNIA
Free format text: CHANGE OF NAME;ASSIGNOR:FOUNDRY NETWORKS, INC.;REEL/FRAME:024733/0739
Effective date: 20090511
|Sep 27, 2012||FPAY||Fee payment|
Year of fee payment: 4
|Jan 21, 2015||AS||Assignment|
Owner name: BROCADE COMMUNICATIONS SYSTEMS, INC., CALIFORNIA
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:034792/0540
Effective date: 20140114
Owner name: INRANGE TECHNOLOGIES CORPORATION, CALIFORNIA
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:034792/0540
Effective date: 20140114
Owner name: FOUNDRY NETWORKS, LLC, CALIFORNIA
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:034792/0540
Effective date: 20140114
|Jan 22, 2015||AS||Assignment|
Owner name: FOUNDRY NETWORKS, LLC, CALIFORNIA
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL AGENT;REEL/FRAME:034804/0793
Effective date: 20150114
Owner name: BROCADE COMMUNICATIONS SYSTEMS, INC., CALIFORNIA
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL AGENT;REEL/FRAME:034804/0793
Effective date: 20150114